HomeSort by relevance Sort by last modified time
    Searched full:scts (Results 1 - 21 of 21) sorted by null

  /external/chromium_org/net/cert/
ct_verify_result.h 19 // More information could be tracked here about SCTs, but for the current UI
25 // SCTs from known logs where the signature verified correctly.
27 // SCTs from known logs where the signature failed to verify.
29 // SCTs from unknown logs and as such are unverifiable.
ct_verifier.h 24 // Verifies SCTs embedded in the certificate itself, SCTs embedded in a
25 // stapled OCSP response, and SCTs obtained via the
28 // SCTs. It is expected that most certificates will use only one source
32 // empty string. |result| will be filled with the SCTs present, divided into
multi_log_ct_verifier.h 50 // Verify a list of SCTs from |encoded_sct_list| over |expected_entry|,
51 // placing the verification results in |result|. The SCTs in the list
ct_log_verifier.h 26 // Class for verifying Signed Certificate Timestamps (SCTs) provided by a
ct_serialization.h 53 // string in |input| to a vector of individually-encoded SCTs |output|.
multi_log_ct_verifier.cc 75 // Log to Net Log, after extracting SCTs but before possibly failing on
134 // XXX(rsleevi): Should we really just skip over bad SCTs?
ct_signed_certificate_timestamp_log_param.cc 114 // Given a list of SCTs, return a ListValue instance where each item in the
multi_log_ct_verifier_unittest.cc 74 //XXX(eranm): entries[1] is the NetLog message with the checked SCTs.
  /external/chromium_org/content/public/browser/
signed_certificate_timestamp_store.h 24 // track of the SCTs associated with loaded resources. It can be accessed from
26 // overflow if we register more than 2^32 - 1 SCTs in 1 browsing session (which
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings.cc 75 const content::SignedCertificateTimestampIDStatusList& scts,
78 scts.begin();
79 it != scts.end();
89 const content::SignedCertificateTimestampIDStatusList& scts,
91 // No SCTs - no CT information.
92 if (scts.empty())
96 if (CertificateTransparencyStatusMatch(scts, net::ct::SCT_STATUS_OK))
100 if (CertificateTransparencyStatusMatch(scts, net::ct::SCT_STATUS_INVALID))
110 // SITE_IDENTITY_STATUS_EV_CERT depending on |is_ev| unless there are SCTs
114 const content::SignedCertificateTimestampIDStatusList& scts,
    [all...]
  /external/chromium_org/net/socket/
ssl_client_socket_nss.h 150 // SCTs are held in three separate vectors in ct_verify_result, each
152 // each of the SCTs with the corresponding SCTVerifyStatus as it adds it to
ssl_client_socket.h 174 // True if SCTs were received via a TLS extension.
ssl_client_socket_nss.cc     [all...]
  /external/chromium_org/net/third_party/nss/patches/
signedcertificatetimestamps.patch 166 + SECItem *scts = &ss->xtnData.signedCertTimestamps;
167 + PORT_Assert(!scts->data && !scts->len);
173 + *scts = *data;
  /external/chromium_org/net/test/spawned_test_server/
base_test_server.h 158 // Temporary glue for testing: validation of SCTs is application-controlled
  /external/chromium_org/net/http/
http_response_info.cc 91 // This bit is set if ssl_info has SCTs.
  /external/chromium_org/net/data/ssl/certificates/
README 235 embedded SCTs, followed by the issuer certificates chain.
  /external/chromium_org/net/third_party/nss/ssl/
ssl3ext.c 2422 SECItem *scts = &ss->xtnData.signedCertTimestamps; local
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
IccUtils.java 98 * "if the MS receives a non-integer value in the SCTS, it shall
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
IccUtils.java 98 * "if the MS receives a non-integer value in the SCTS, it shall
  /external/chromium_org/net/base/
net_log_event_type_list.h 576 // "verified_scts": <A list of SCTs>,
577 // "invalid_scts": <A list of SCTs>,
578 // "scts_from_unknown_logs": <A list of SCTs>,
    [all...]

Completed in 917 milliseconds